ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A431847E0994
|
Infrastructure Scan
ADDRESS: 0x829f4b62eebe12af653b4dd4ffc480966f7d7f09
DEPLOYED: 2026-05-03 14:33:47
LAST_TX: 2026-05-06 22:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0x829f4b62eebe12af653b4dd4ffc480966f7d7f09… [FETCH] Entry point found at offset 0x4bde. [SCAN] Identifying function signatures (0x71afd123). [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xe30dc4e412dbafeadf25eb536468dc02d1b02d8c. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Finalizing audit report for 0x829f4b62eebe12af653b4dd4ffc480966f7d7f09. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xad6cd5be01eaad2ad839e003bdb6ed6d7824e972 0xb640d7be4a3de7de35c2befd0bbcd79e7e7c3949 0x4918b6539eb44a5ea9997100ee0ce6e9019b755d 0x26d9aacce9d28323cdf8a6a28a2d8048a555540c 0xf46ed62b0ba871b0f34e67f09e6106d84fdedc99 0xc6bf89121ce3470ce5859708bad720b4d7b4a697 0x553103380761ac702d4c3f60cf6ebbe5e0347619 0xa83998410201e2ed4cb3840a61ccae3dae824be6 0x1b154bdf4efb5639ffe9446518c64ddccba3ba28 0x789f23111c8320d102a6aefbb033214f6aeb3af2 0xa9cd6842870c3d67760f76d6e7bdd227321f3e47 0x085e61879286bedb51f6f98ad65123e074aa5861 0xdb8badf3ed3560595a4334da5abc78d9a408bb19 0x6b97e3510a092ac9d8ad3d57b12fd4fcc3502038 0x233ae00dbc4f1f05df157ffdf6e8ff5b1aad7a6c 0x89cec847b1ed8a019e1e182dbce73def26e2deef 0xb5afe4ae74481fa3526580a92c1244ca26e8f7a9 0x572ccdf46949051d6661c8d68507edf5432a12eb 0xcbe40f967e7fd901063a02222ca946c7624b2c7b 0x14eb3896decd1e2a12d862976339977638ec6d05